Details have emerged about a now-patched security vulnerability in the Snort intrusion detection and prevention system that could trigger a denial-of-service (DoS)...
An 18-month-long analysis of the PYSA ransomware operation has revealed that the cybercrime cartel followed a five-stage software development cycle from August...
Cybersecurity researchers are warning of two different information-stealing malware, named FFDroider and Lightning Stealer, that are capable of siphoning data and launching...
Cybersecurity researchers have uncovered further links between BlackCat (aka AlphaV) and BlackMatter ransomware families, the former of which emerged as a replacement...
Cybersecurity researchers have detailed a “simple but efficient” persistence mechanism adopted by a relatively nascent malware loader called Colibri, which has been...
A nascent information stealer called Mars has been observed in campaigns that take advantage of cracked versions of the malware to steal...
Authentication services provider Okta on Wednesday named Sitel as the third-party linked to a security incident experienced by the company in late...
New findings released last week showcase the overlapping source code and techniques between the operators of Shamoon and Kwampirs, indicating that they...
Linux distributions are in the process of issuing patches to address a newly disclosed security vulnerability in the kernel that could allow...
Over the past few days a Ukrainian researcher has waged a campaign against the operators of the Conti ransomware, inadvertently spying on...
A cybersecurity specialist received a bug bounty of $250,000 USD thanks to his report of a critical vulnerability in the cryptocurrency exchange...
Cybersecurity researchers have unpacked a nascent Golang-based botnet called Kraken that’s under active development and features an array of backdoor capabilities to...
Earlier this week, VMware announced the correction of multiple critical vulnerabilities in products such as VMware ESXi, Workstation and Fusion, most of...
Cybersecurity researchers have detailed the inner workings of ShadowPad, a sophisticated and modular backdoor that has been adopted by a growing number...
In recent weeks, several cyber security researchers have reported massive flaws in the Internet infrastructure in North Korea, affecting the few users...
Natalie Silvanovich, a researcher at Google Project Zero, reported the detection of two vulnerabilities in the Zoom video conferencing platform whose exploitation...
Cybersecurity researchers have decoded the mechanism by which the versatile Qakbot banking trojan handles the insertion of encrypted configuration data into the...
In a recent sophisticated malware campaign, the hackers have targeted the cybersecurity researchers and developers in which they were found to be...
A study of 16 different Uniform Resource Locator (URL) parsing libraries has unearthed inconsistencies and confusions that could be exploited to bypass...
The U.S. Department of Justice (DOJ) announced that Lucy Xi, a resident of the state of Philadelphia, has pleaded guilty to conspiracy...
According to Max Weinbach of Android Police, “Samsung is hosting literal malware on the Galaxy Store.” It is becoming harder and harder...